Analysis

  • max time kernel
    842s
  • max time network
    843s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2025, 16:39

General

  • Target

    dolphSol-Macro-1.4.0/lib/staticData.json

  • Size

    12KB

  • MD5

    3743d4e4361e9e8fe52b05d40c2e5696

  • SHA1

    673d653f59d4aba9399629573bd010df87787898

  • SHA256

    b99e0669e40428ff495675ab32c71fc3e4dbd1e60f851e8b40221ef94e28b2a3

  • SHA512

    4a5b57adbcde0b6fdb76f9bcb914061555a8ad9b18bdb68b133b0f1c5666092f8508c98dcb336d8378cda0e6f80edab9ec9d64936640e84266b44064b51815ec

  • SSDEEP

    384:JW7W0gG5ZUpK30j9+ocCf/RGLzk9i0gJKKDC5Kp8//tDy9Xhn1L81bQQQWBORc/Y:AW0gG5ZUw30j9+ocCf/RGLzk9i0gJKKd

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\dolphSol-Macro-1.4.0\lib\staticData.json
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\dolphSol-Macro-1.4.0\lib\staticData.json
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\dolphSol-Macro-1.4.0\lib\staticData.json"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    925dbf59c62c0dc9f8bc4deef9e2ef51

    SHA1

    3129bad9bafdc25e4e568ec210339288dd9287ee

    SHA256

    c9fb38967daf55cfe0cf4e14f977397c4b5b6b0ac596573dbc4eef23b5d60a3f

    SHA512

    003b1338b31d1c74a13425cdf3667b2792d1adf72a622f77ca5b0b9a7da99c24ee278ba73e0c53be09b5379ac3b60b47a8f0c13297f5131469c00d9c2d0fc02f